Jact OpenClinic 0.8.20160412 allows the attacker to read server files after login to the the admin account by an infected 'file' GET parameter in '/shared/view_source.php' which "could" lead to RCE vulnerability .
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Link | Tags |
---|---|
https://cwe.mitre.org/data/definitions/23.html | technical description |
https://github.com/jact/openclinic/issues/8 | issue tracking patch exploit third party advisory |